نتایج جستجو برای: 1 treatment conclusion generally

تعداد نتایج: 4324331  

2003
K. Keutzer S. Malik A. R. Newton

This paper presents a new hardware-software co-design methodology for resource constrained SoC realized in a deep submicron process (DSM). The methodology is useful for multimedia applications optimized for latency. The approach addresses layout and hardware aspects relevant to system design: it considers the dependency of task communication speed on interconnect parasitic, as well as the possi...

1994

were made for get_file operations on a disk to memory basis, i.e. the files were requested from the file servers disk and discarded on the receivers side. Thus we where able to neglect the influence of local disk write operations upon the results. This resembles a scenario where a user requests a certain file (e.g. a drawing) for viewing. Since drawings are typically stored as bitmaps (binary) ...

1995

Experiments with the Fuzzy ACC under various traffic conditions have shown that the fuzzy approach is very robust especially with regard to the inevitable sensor noise. The modular architecture facilitates fine-tuning of the fuzzy controller for the different situation-specific components and minimizes interference of those components during operation. The approach to adaptation has two main go...

1995
C. Elliot B. Kerherve

14 On the receipt of the service request, the QoS manager translates this request on one or more logical configurations based on the profile concept, and produces the corresponding configurations by accessing the system information repository (4). To decide about the possibility of the establishment of a configuration which is the mapping result of a logical configuration, the QoS manager asks ...

1993

The Security functionality provided by the protocols is almost equivalent. While the FTAM and RDA authentication and authorisation mechanisms are a mere mapping to those of the accessed file system or database, DFR defines own mechanisms. No sound statements on efficiency and reliability issues of the protocols can be made right now. These have to be derived from experiences with trial implemen...

1996
P. M. Melliar-Smith L. E. Moser

A reliable multicast protocol enables a process to multicast a message to a group of processes in a way that ensures that all honest destination-group members receive the same message, even if some group members and the multicast initiatorare maliciously faulty. Reliable multicast has been shown to be useful for building multiparty cryptographic protocols and secure distributed services. We pre...

Journal: :Schizophrenia bulletin 2015
Celso Arango René S Kahn

In the study of McFarlane et al1 a community outreach program was set up to reduce the transition to psychosis in subjects at increased risk. A broad range of subjects (aged 15–25) was included, from low risk to frank psychosis. The design was not randomized on the basis of ethical considerations. Treatment consisted of familyaided assertive community treatment (FACT) and medication in the form...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید